CVE-2023-44156

7.5 HIGH

📋 TL;DR

CVE-2023-44156 is a sensitive information disclosure vulnerability in Acronis Cyber Protect 15 caused by spell-jacking, which allows attackers to access sensitive data. This affects Acronis Cyber Protect 15 installations on both Linux and Windows systems before build 35979. The vulnerability exposes potentially confidential information to unauthorized parties.

💻 Affected Systems

Products:
  • Acronis Cyber Protect 15
Versions: All versions before build 35979
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Linux and Windows installations of Acronis Cyber Protect 15. The vulnerability is present in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate sensitive configuration data, credentials, or other protected information, potentially leading to further system compromise or data breaches.

🟠

Likely Case

Unauthorized access to sensitive system information that could be used for reconnaissance or to facilitate other attacks.

🟢

If Mitigated

Limited or no data exposure if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific conditions related to spell-jacking techniques. No public proof-of-concept has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Build 35979 or later

Vendor Advisory: https://security-advisory.acronis.com/advisories/SEC-5124

Restart Required: Yes

Instructions:

1. Download the latest version from Acronis official sources. 2. Backup current configuration. 3. Install build 35979 or later. 4. Restart the Acronis Cyber Protect service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Acronis Cyber Protect instances to only trusted networks and required administrative systems.

Access Control Hardening

all

Implement strict access controls and authentication requirements for accessing the Acronis Cyber Protect management interface.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Acronis Cyber Protect instances from untrusted networks
  • Enable enhanced logging and monitoring for suspicious access attempts to the Acronis management interface

🔍 How to Verify

Check if Vulnerable:

Check the Acronis Cyber Protect version in the management console or via command line. Versions before build 35979 are vulnerable.

Check Version:

On Windows: Check via Acronis Management Console. On Linux: Check installation logs or use package manager queries specific to your distribution.

Verify Fix Applied:

Verify the installed version is build 35979 or later through the management interface or version check commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Acronis management interface
  • Multiple failed authentication attempts followed by successful access
  • Unexpected data export or access logs

Network Indicators:

  • Unusual outbound traffic from Acronis servers
  • Traffic patterns indicating data exfiltration
  • Connections from unexpected IP addresses to Acronis management ports

SIEM Query:

source="acronis_logs" AND (event_type="unauthorized_access" OR event_type="sensitive_data_access")

🔗 References

📤 Share & Export